A CISO Perspective on GDPR

May 23, 2018 | John McLeod
May 23, 2018 | John McLeod

A CISO Perspective on GDPR

There’s much talk about the General Data Privacy Regulation (GDPR) taking effect on May 25 and its impact on US companies with European operations. As more and more information has been collected electronically over the years, it’s become necessary to mandate that companies better protect this information from being breached. With this mandate, the days of collecting…

May 22, 2018 | Kate Brew

Should the US have Its Own GDPR and Other Questions Surveyed at RSA 2018

Privacy has always had a degree of overlap with security, however, recent years has increased the dependency each has on the other. Be that with regards to protecting individual information, the use of social media, or the requirements to respond to breaches.RSA 2018 gave us an excellent opportunity to gather the opinions of InfoSec professionals. We were able to get…

Get the latest security news in your inbox.

Subscribe via Email

May 21, 2018 | Altaz Valani

The Security Policy to Development Procedure Gap

Usually when we talk about DevOps, there's an emphasis on development and operational activities. Often, a key focus is neglected: how we inject security into the DevOps context.If we examine the confluence of events leading to the current issues we face around security and DevOps, two broad factors become clear. For one, security has been left behind in…

May 18, 2018 | Javvad Malik

Things I Hearted this Week, 18th May 2018

You know the BBC have got their priorities really wrong they pitch Meghan Markle saying her father snubbing the Royal wedding as "Breaking news". What is surprising though is that I haven't seen all that many phishing emails related to the wedding hitting my inbox. Maybe the scammers know that I wouldn't pay much attention anyway.Meghan Markle…

May 16, 2018 | Alex Shanteau

Focus: NIST 800-171 - Leveraging an MSSP for Compliance Frameworks

For many businesses, compliance is becoming a way of life.  As cyber-attacks and data breaches are revealed and reported on a regular basis, new compliance requirements will continue to be implemented.  A couple of recent examples are the NIST 800-171 (Defense Federal Acquisition Regulation Supplement or DFARS) requirements for Controlled Unclassified Information (CUI) and GDPR regulations for protecting…

May 15, 2018 | Bob Covello

Gather Your OSINT Before the Interview for Your InfoSec Stint

Are you a new InfoSec professional, perhaps seeking your first job in the growing field of Information Security? Many years ago, before the internet existed, a person would use the local newspaper to perform a job search. The usual protocols were often followed, including the sending of a resume, an introductory phone call (if the recipient liked the resume), and…

May 14, 2018 | Jordan Ryan

As GDPR Looms, Businesses Need Compliance Help from MSPs

The General Data Protection Regulation (GDPR) becomes law across the European Union on May 25, but most businesses within the territory are not ready to comply, placing themselves at risk of incurring stiff non-compliance fines. In the short time that is left, Managed Services Providers (MSPs) have a unique opportunity to help usher businesses into compliance through education and implementation.GDPR…

May 11, 2018 | Javvad Malik

Things I Hearted this Week, 11th May 2018

Growing up in London, I don’t think we ever got Mister Rogers on TV. With the new movie coming out on his life, there have been many articles and columns discussing him. An interesting fact I came across was that Mister Rogers always mentioned out loud that he was feeding his fish because a blind viewer once asked…

May 10, 2018 | Mike LaPeters

Opportunity for Managed Services: InfoSec

The single, biggest opportunity for channel partners in 2018 is to stand in the path of aggressive hackers as they attempt to exploit businesses around the world. Today’s threat landscape is infinitely more complex than even three years ago, and companies are finding themselves more at risk because they just don’t have the infrastructure, resources, personnel and…

May 9, 2018 | Chuck Brooks

Cybersecurity, Is there Light at the End of The Tunnel in 2018?

2017 was certainly a challenging year for cybersecurity. The volume of data breaches continued to climb from the already alarming experiences of previous years. The sophistication and intensity of cyberattacks from social engineering, ransomware, and DDOS attacks also experienced exponential growth. The question remains, what should we expect (or fear) in 2018?Succinctly, in 2017, globally there were a total of 5,207 breaches and 7.89…

May 8, 2018 | Javvad Malik

Social Media Risks – The TweetChat

Our latest Tweetchat was on the topic of Social Media risks and featured guest Joseph Steinberg.Why did we choose social media? Social channels are easy to overlook when companies are assessing assets and assigning criticality. Social usually falls under the banner of marketing, so IT teams sometimes have little or no visibility altogether into the digital footprint a company…

May 7, 2018 | Kim Crawley

Explain Biometric Authentication

Authentication in and outside of computing can be done in one of three ways. It can be based on something you know, such as a password. It can be based on something you have, such as a keycard. Or it can be based on something that you are. That’s where biometrics comes in.A very brief history of…

Watch a Demo ›
GET PRICE FREE TRIAL